Accepted papers for PETS 2023

Issue 1

  • Privacy Rarely Considered: Exploring Considerations in the Adoption of Third-Party Services by Websites
    Christine Utz (CISPA Helmholtz Center for Information Security), Sabrina Amft (CISPA Helmholtz Center for Information Security), Martin Degeling (Ruhr University Bochum), Thorsten Holz (CISPA Helmholtz Center for Information Security), Sascha Fahl (CISPA Helmholtz Center for Information Security), and Florian Schaub (University of Michigan)
  • Not Your Average App: A Large-scale Privacy Analysis of Android Browsers
    Amogh Pradeep (Northeastern University), Álvaro Feal (IMDEA Networks / Universidad Carlos III de Madrid), Julien Gamba (IMDEA Networks / Universidad Carlos III de Madrid), Ashwin Rao (University of Helsinki), Martina Lindorfer (TU Wien), Narseo Vallina-Rodriguez (IMDEA Networks / ICSI / AppCensus Inc.), and David Choffnes (Northeastern University)
  • “Revoked just now!” Users’ Behaviors Toward Fitness-Data Sharing with Third-Party Applications artifact
    Noé Zufferey (University of Lausanne), Kavous Salehzadeh Niksirat (University of Lausanne), Mathias Humbert (University of Lausanne), and Kévin Huguenin (University of Lausanne)
  • SoK: Secure Aggregation based on cryptographic schemes for Federated Learning
    Mohamad Mansouri (EURECOM), Melek Önen (EURECOM), Wafa Ben Jaballah (Thales SIX GTS), and Mauro Conti (University of Padua)
  • Exploring Model Inversion Attacks in the Black-box Setting
    Antreas Dionysiou (University of Cyprus), Vassilis Vassiliades (CYENS Centre of Excellence), and Elias Athanasopoulos (University of Cyprus)
  • No Privacy Among Spies: Assessing the Functionality and Insecurity of Consumer Android Spyware Apps
    Enze Liu (University of California, San Diego), Sumanth Rao (University of California, San Diego), Sam Havron (Cornell Tech), Grant Ho (University of California, San Diego), Stefan Savage (University of California, San Diego), Geoffrey M. Voelker (University of California, San Diego), and Damon McCoy (New York University)
  • Designing a Location Trace Anonymization Contest artifact
    Takao Murakami (AIST), Hiromi Arai (RIKEN), Koki Hamada (NTT), Takuma Hatano (NSSOL), Makoto Iguchi (Kii Corporation), Hiroaki Kikuchi (Meiji University), Atsushi Kuromasa (Data Society Alliance), Hiroshi Nakagawa (RIKEN), Yuichi Nakamura (SoftBank Corp.), Kenshiro Nishiyama (LegalForce), Ryo Nojima (NICT), Hidenobu Oguri (Fujitsu Limited), Chiemi Watanabe (Tsukuba University of Technology), Akira Yamada (KDDI Research, Inc.), Takayasu Yamaguchi (Akita Prefectural University), and Yuji Yamaoka (Fujitsu Limited)
  • Detect your fingerprint in your photographs : Photography-based multi-feature Sybil detection
    Yerim Kim (Korea University), Minjae Kim (Korea University), Myungjae Chung (Korea University), and Junbeom Hur (Korea University)
  • StyleID: Identity Disentanglement for Anonymizing Faces artifact
    Minh-Ha Le (Linkoping University) and Niklas Carlsson (Linkoping University)
  • SoK: Secure E-Voting with Everlasting Privacy
    Thomas Haines (Australian National University), Rafieh Mosaheb (University of Luxembourg), Johannes Mueller (University of Luxembourg), and Ivan Pryvalov (University of Luxembourg)
  • Investigating Privacy Decision-Making Processes Among Nigerian Men and Women.
    Victor Yisa (Dalhousie University), Reza Ghaiumy Anaraky (Clemson University), Bart P. Knijnenburg (Clemson University), and Rita Orji (Dalhousie University)
  • Privacy by Projection: Federated Population Density Estimation by Projecting on Random Features
    Zixiao Zong (University of California, Irvine), Mengwei Yang (University of California, Irvine), Justin Scott Ley (University of California, Irvine), Athina Markopoulou (University of California, Irvine), and Carter Butts (University of California, Irvine)
  • HeLayers: A Tile Tensors Framework for Large Neural Networks on Encrypted Data artifact
    Ehud Aharoni (IBM Research - Haifa), Allon Adir (IBM Research - Haifa), Moran Baruch (IBM Research - Haifa and Bar Ilan University), Nir Drucker (IBM Research - Haifa), Gilad Ezov (IBM Research - Haifa), Ariel Farkash (IBM Research - Haifa), Lev Greenberg (IBM Research - Haifa), Ramy Masalha (IBM Research - Haifa), Guy Moshkowich (IBM Research - Haifa), Dov Murik (IBM Research - Haifa), Hayim Shaul (IBM Research - Haifa), and Omri Soceanu (IBM Research - Haifa)
  • Efficient decision tree training with new data structure for secure multi-party computation
    Koki Hamada (NTT), Dai Ikarashi (NTT), Ryo Kikuchi (NTT), and Koji Chida (Gunma University)
  • FrodoPIR: Simple, Scalable, Single-Server Private Information Retrieval artifact
    Alex Davidson (Brave Software), Gonçalo Pestana (Brave Software), and Sofía Celi (Brave Software)
  • "Surprised, Shocked, Worried": User Reactions to Facebook Data Collection from Third Parties
    Patricia Arias-Cabarcos (Paderborn University), Saina Kjalili (unaffiliated), and Thorsten Strufe (KIT)
  • MIAShield: Defending Membership Inference Attacks via Preemptive Exclusion of Members
    Ismat Jarin (University of Michigan-Dearborn) and Birhanu Eshete (University of Michigan-Dearborn)
  • Dynamic Volume-Hiding Encrypted Multi-Maps with Applications to Searchable Encryption
    Ghous Amjad (Google), Sarvar Patel (Google), Giuseppe Persiano (University of Salerno), Kevin Yeo (Google), and Moti Yung (Google)
  • I-GWAS: Privacy-Preserving Interdependent Genome-Wide Association Studies
    Túlio Pascoal (University of Luxembourg), Jérémie Decouchant (TU Delft), Antoine Boutet (INSA, INRIA, University of Lyon, CITI), and Marcus Völp (University of Luxembourg)
  • Is There a Reverse Privacy Paradox? An Exploratory Analysis of Gaps Between Privacy Perspectives and Privacy-Seeking Behaviors
    Jessica Colnago (Google), Alessandro Acquisti (Carnegie Mellon University), and Lorrie Cranor (Carnegie Mellon University)
  • Privacy Concerns and Acceptance Factors of OSINT for Cybersecurity: A Representative Survey
    Thea Riebe (TU Darmstadt, PEASEC), Tom Biselli (TU Darmstadt, PEASEC), Marc-André Kaufhold (TU Darmstadt, PEASEC), and Christian Reuter (TU Darmstadt, PEASEC)
  • Lox: Protecting the Social Graph in Bridge Distribution artifact
    Lindsey Tulloch (University of Waterloo) and Ian Goldberg (University of Waterloo)
  • How Much Privacy Does Federated Learning with Secure Aggregation Guarantee?
    Ahmed Roushdy Elkordy (University of Southern California), Jiang Zhang (University of Southern California), Yahya H. Ezzeldin (University of Southern California), Konstantinos Psounis (University of Southern California), and Salman Avestimehr (University of Southern California)
  • Private Multi-Winner Voting for Machine Learning
    Adam Dziedzic (University of Toronto and Vector Institute), Christopher A. Choquette-Choo (Google Brain), Natalie Dullerud (University of Toronto and Vector Institute), Vinith Suriyakumar (MIT), Ali Shahin Shamsabadi (The Alan Turing Institute), Muhammad Ahmad Kaleem (University of Toronto and Vector Institute), Somesh Jha (University of Wisconsin), Nicolas Papernot (University of Toronto and Vector Institute), and Xiao Wang (Northwestern University)
  • Privacy-Aware Adversarial Network in Human Mobility Prediction artifact
    Yuting Zhan (Imperial College London), Hamed Haddadi (Imperial College London), and Afra Mashhadi (University of Washington)
  • Exploring privacy implications of awareness and control mechanisms in smart home devices
    Madiha Tabassum (University of North Carolina at Charlotte) and Heather Richter Lipford (University of North Carolina at Charlotte)
  • Dolphin: A Cellular Voice Based Internet Shutdown Resistance System
    Piyush Kumar Sharma (IIIT Delhi), Rishi Sharma (IIIT Delhi), Kartikey Singh (IIIT Delhi), Mukulika Maity (IIIT Delhi), and Sambuddho Chakravarty (IIIT Delhi)
  • Multi-Party Replicated Secret Sharing over a Ring with Applications to Privacy-Preserving Machine Learning artifact
    Alessandro Baccarini (University at Buffalo), Marina Blanton (University at Buffalo), and Chen Yuan (University at Buffalo)
  • Efficient Proofs of Software Exploitability for Real-world Processors
    Matthew Green (Johns Hopkins University), Mathias Hall-Andersen (Aarhus University), Eric Hennenfent (Trail of Bits), Gabriel Kaptchuk (Boston University), Benjamin Perez (Trail of Bits), and Gijs Van Laer (Johns Hopkins University)
  • On the Privacy Risks of Deploying Recurrent Neural Networks in Machine Learning Models artifact
    Yunhao Yang (University of Texas at Austin), Parham Gohari (University of Texas at Austin), and Ufuk Topcu (University of Texas at Austin)
  • Blind My - Robust Stalking Prevention in Apple's Find My Network
    Travis Mayberry (United States Naval Academy), Erik-Oliver Blass (Airbus), and Ellis Fenske (US Naval Academy)
  • Differentially Private Speaker Anonymization
    Ali Shahin Shamsabadi (The Alan Turing Institute), Brij Mohan Lal Srivastava (INRIA), Aurélien Bellet (INRIA), Nathalie Vauquier (INRIA), Emmanuel Vincent (INRIA), Mohamed Maouche (INRIA), Marc Tommasi (INRIA), and Nicolas Papernot (University of Toronto and Vector Institute)
  • TWo-IN-one-SSE: Fast, Scalable and Storage-Efficient Searchable Symmetric Encryption for Conjunctive and Disjunctive Boolean Queries artifact
    Arnab Bag (Indian Institute of Technology Kharagpur), Debadrita Talapatra (Indian Institute of Technology Kharagpur), Ayushi Rastogi (Indian Institute of Technology Kharagpur), Sikhar Patranabis (IBM Research India), and Debdeep Mukhopadhyay (Indian Institute of Technology Kharagpur)
  • Individualized PATE: Differentially Private Machine Learning with Individual Privacy Guarantees artifact
    Franziska Boenisch (Free University Berlin), Christopher Mühl (Free University Berlin), Roy Rinberg (Columbia University), Jannis Ihrig (Free University Berlin), and Adam Dziedzic (University of Toronto and Vector Institute)
  • Understanding Person Identification Through Gait artifact
    Simon Hanisch (Technische Universität Dresden), Evelyn Muschter (Technische Universität Dresden), Adamantini Chatzipanagioti (Technische Universität Dresden), Shu-Chen Li (Technische Universität Dresden), and Thorsten Strufe (Karlsruhe Institute of Technology)

Issue 2

  • Intersectional Thinking about PETs: A Study of Library Privacy
    Nora McDonald (George Mason University), Rachel Greenstadt (New York University), and Andrea Forte (Drexel University)
  • Heads in the Clouds? Measuring Universities’ Migration to Public Clouds: Implications for Privacy & Academic Freedom artifact
    Tobias Fiebig (Max-Planck-Institut für Informatik), Seda Gürses (TU Delft), Carlos H. Gañán (TU Delft), Erna Kotkamp (TU Delft), Fernando Kuipers (TU Delft), Martina Lindorfer (TU Wien), Menghua Prisse (TU Delft), and Taritha Sari (TU Delft)
  • Lessons Learned: Surveying the Practicality of Differential Privacy in the Industry
    Gonzalo Munilla Garrido (Technical University of Munich, BMW Group), Xiaoyuan Liu (UC Berkeley), Florian Matthes (Technical University of Munich), and Dawn Song (UC Berkeley)
  • Privacy Property Graph: Towards Automated Privacy Threat Modeling via Static Graph-based Analysis
    Immanuel Kunz (Fraunhofer AISEC), Konrad Weiss (Fraunhofer AISEC), Christian Banse (Fraunhofer AISEC), and Angelika Schneider (Fraunhofer AISEC)
  • DeepSE-WF: Unified Security Estimation for Website Fingerprinting Defenses artifact
    Alexander Veicht (ETH Zürich), Cedric Renggli (University of Zurich), and Diogo Barradas (University of Waterloo)
  • iPET: Privacy Enhancing Traffic Perturbations for Secure IoT Communications artifact
    Akshaye Shenoi (TUMCREATE Singapore), Prasanna Karthik Vairam (National University of Singapore), Kanav Sabharwal (National University of Singapore), Li Jialin (National University of Singapore), and Dinil Mon Divakaran (Acronis Research)
  • Creative beyond TikToks: Investigating Adolescents’ Social Privacy Management on TikTok artifact
    Nico Ebert (ZHAW School of Management and Law), Tim Geppert (ZHAW School of Management and Law), Joanna Strycharz (University of Amsterdam), Melanie Knieps (University of Zurich), Michael Hönig (ZHAW School of Management and Law), and Elke Brucker-Kley (ZHAW School of Management and Law)
  • Distributed GAN-Based Privacy-Preserving Publication of Vertically-Partitioned Data
    Xue Jiang (Technical University of Munich), Yufei Zhang (Technical University of Munich), Xuebing Zhou (Huawei Technologies Deutschland GmbH), and Jens Grossklags (Technical University of Munich)
  • How Website Owners Face Privacy Issues: Thematic Analysis of Responses from a Covert Notification Study Reveals Diverse Circumstances and Challenges
    Alina Stöver (TU Darmstadt), Nina Gerber (TU Darmstadt), Henning Pridöhl (Universität Bamberg), Max Maass (), Sebastian Bretthauer (Goethe-Universität Frankfurt), Indra Spiecker (Goethe-Universität Frankfurt), Matthias Hollick (TU Darmstadt), and Dominik Herrmann (Universität Bamberg)
  • Usability and Enforceability of Global Privacy Control artifact
    Sebastian Zimmeck (Wesleyan University), Oliver Wang (Wesleyan University), Kuba Alicki (Wesleyan University), Jocelyn Wang (Wesleyan University), and Sophie Eng (Wesleyan University)
  • Watching your call: Breaking VoLTE Privacy in LTE/5G Networks
    Zishuai Cheng (Beijing University of Posts and Telecommunications), Mihai Ordean (University of Birmingham), Flavio D. Garcia (University of Birmingham), Baojiang Cui (Beijing University of Posts and Telecommunications), and Dominik Rys (University of Birmingham)
  • Strengthening Privacy-Preserving Record Linkage using Diffusion artifact
    Frederik Armknecht (University of Mannheim), Youzhe Heng (University of Mannheim), and Rainer Schnell (University of Duisburg-Essen)
  • A Unified Framework for Quantifying Privacy Risk in Synthetic Data artifact
    Matteo Giomi (Statice GmbH), Franziska Boenisch (Vector Institute), Christoph Wehmeyer (Statice GmbH), and Borbála Tasnádi (Statice GmbH)
  • Unintended Memorization and Timing Attacks in Named Entity Recognition Models
    Rana Salal Ali (Macquarie University), Benjamin Zi Hao Zhao (Macquarie University), Hassan Asghar (Macquarie University), Tham Nguyen (Macquarie University), Ian Wood (Macquarie University), and Mohamed Ali Kaafar (Macquarie University)
  • RPM: Robust Anonymity at Scale artifact
    Donghang Lu (Purdue University) and Aniket Kate (Purdue University)
  • Private Sampling with Identifiable Cheaters artifact
    César Sabater (INRIA), Florian Hahn (University of Twente), Andreas Peter (University of Oldenburg), and Jan Ramon (INRIA)
  • Investigating how users imagine their Personal Privacy Assistant
    Alina Stöver (TU Darmstadt), Sara Hahn (TU Darmstadt), Felix Kretschmer (), and Nina Gerber (TU Darmstadt)
  • SoK: Content Moderation for End-to-End Encryption
    Sarah Scheffler (Princeton University) and Jonathan Mayer (Princeton University)
  • ezDPS: An Efficient and Zero-Knowledge Machine Learning Inference Pipeline
    Haodi Wang (Beijing Normal University / Virginia Tech) and Thang Hoang (Virginia Tech)
  • Two-Cloud Private Read Alignment to a Public Reference Genome artifact
    Sindhuja Madabushi (University of Wisconsin-Madison) and Parameswaran Ramanathan (University of Wisconsin-Madison)
  • PubSub-ML: A Model Streaming Alternative to Federated Learning
    Lovedeep Gondara (Simon Fraser University) and Ke Wang (Simon Fraser University)
  • SoK: Differentially Private Publication of Trajectory Data
    Àlex Miranda-Pascual (Universitat Politècnica de Catalunya, Karlsruhe Institute of Technology), Patricia Guerra-Balboa (Karlsruhe Institute of Technology), Javier Parra-Arnau (Universitat Politècnica de Catalunya, Karlsruhe Institute of Technology), Jordi Forné (Universitat Politècnica de Catalunya), and Thorsten Strufe (Karlsruhe Institute of Technology)
  • An Efficient Data-Independent Priority Queue and its Application to Dark Pools
    Sahar Mazloom (J. P. Morgan AI Research), Benjamin Diamond (Coinbase), Antigoni Polychroniadou (J. P. Morgan AI Research), and Tucker Balch (J. P. Morgan AI Research)
  • Find Thy Neighbourhood: Privacy-Preserving Local Clustering
    Pranav Shriram A (National Institute of Technology Tiruchirappalli), Nishat Koti (Indian Institute of Science Bangalore), Varsha Bhat Kukkala (Indian Institute of Science Bangalore), Arpita Patra (Indian Institute of Science Bangalore), and Bhavish Raj Gopal (Indian Institute of Science Bangalore)
  • Result-pattern-hiding Conjunctive Searchable Symmetric Encryption with Forward Privacy
    Dandan Yuan (The University of Auckland), Cong Zuo (Nanyang Technological University), Shujie Cui (Monash University), and Giovanni Russello (The University of Auckland)
  • Private Graph Extraction via Feature Explanations artifact
    Iyiola Emmanuel Olatunji (L3S Research Center, Leibniz University Hannover), Mandeep Rathee (L3S Research Center, Leibniz University Hannover), Thorben Funke (L3S Research Center, Leibniz University Hannover), and Megha Khosla (TU Delft)
  • iStelan: Disclosing Sensitive User Information by Mobile Magnetometer from Finger Touches
    Reham Aburas (Purdue University), Habiba Farrukh (Purdue University), He Wang (Purdue University), Yidong Lu (Purdue University), and Z. Berkay Celik (Purdue University)
  • SoK: Managing risks of linkage attacks on data privacy
    Jovan Powar (University of Cambridge) and Alastair Beresford (University of Cambridge)

Issue 3

  • Trust TEE?: Exploring the Impact of Trusted Execution Environments on Smart Home Privacy Norms
    Pratik Musale (University of Pittsburgh) and Adam Lee (University of Pittsburgh)
  • Evolution of Composition, Readability, and Structure of Privacy Policies over Two Decades
    Andrick Adhikari (University of Denver), Sanchari Das (University of Denver), and Rinku Dewri (University of Denver)
  • SoK: New Insights into Fully Homomorphic Encryption Libraries via Standardized Benchmarks artifact
    Charles Gouert (University of Delaware), Dimitris Mouris (University of Delaware), and Nektarios Georgios Tsoutsos (University of Delaware)
  • Comparing Large-Scale Privacy and Security Notifications
    Christine Utz (CISPA Helmholtz Center for Information Security), Matthias Michels (Saarland University), Martin Degeling (Ruhr University Bochum), Ninja Marnau (CISPA Helmholtz Center for Information Security), and Ben Stock (CISPA Helmholtz Center for Information Security)
  • RAVEN: Stateless Rapid IP Address Variation for Enterprise Networks artifact
    Liang Wang (Princeton University), Hyojoon Kim (Princeton University), Prateek Mittal (Princeton University), and Jennifer Rexford (Princeton University)
  • How to Combine Membership-Inference Attacks on Multiple Updated Models
    Matthew Jagielski (Google), Stanley Wu (Northeastern University), Alina Oprea (Northeastern University), Jonathan Ullman (Northeastern University), and Roxana Geambasu (Columbia University)
  • SenRev: Measurement of Personal Information Disclosure in Online Health Communities
    Faysal Hossain Shezan (University of Virginia), Minjun Long (University of Virginia), David Hasani (University of Virginia), Gang Wang (University of Illinois at Urbana-Champaign), and Yuan Tian (University of California Los Angeles)
  • "My face, my rules": Enabling Personalized Protection against Unacceptable Face Editing
    Zhujun Xiao (University of Chicago), Jenna Cryan (University of Chicago), Yuanshun Yao (University of Chicago), Yi Hong Gordon Cheo (University of Chicago), Yuanchao Shu (Microsoft Research), Stefan Saroiu (Microsoft Research), Ben Y. Zhao (University of Chicago), and Haitao Zheng (University of Chicago)
  • Examining the Hydra: Simultaneously Shared Links in Tor and the Effects on its Performance artifact
    Sebastian Pahl (Hof University of Applied Sciences, Institute of Information Systems (iisys)), Florian Adamsky (Hof University of Applied Sciences, Institute of Information Systems (iisys)), Daniel Kaiser (Status Research & Development GmbH), and Thomas Engel (University of Luxembourg)
  • SoK: Membership Inference is Harder Than we Previously Thought artifact
    Antreas Dionysiou (University of Cyprus) and Elias Athanasopoulos (University of Cyprus)
  • Losing Less: A Loss for Differentially Private Deep Learning
    Ali Shahin Shamsabadi (The Alan Turing Institute and Vector Institute) and Nicolas Papernot (University of Toronto and Vector Institute)
  • Convolutions in Overdrive: Maliciously Secure Convolutions for MPC artifact
    Marc Rivinius (University of Stuttgart), Pascal Reisert (University of Stuttgart), Sebastian Hasler (University of Stuttgart), and Ralf Küsters (University of Stuttgart)
  • VESPo: Verified Evaluation of Secret Polynomials, with application to dynamic proofs of retrievability artifact
    Jean-Guillaume Dumas (Univ. Grenoble Alpes), Aude Maignan (Univ. Grenoble Alpes), Clément Pernet (Univ. Grenoble Alpes), and Daniel S. Roche (U.S. Naval Academy)
  • DPrio: Efficient Differential Privacy with High Utility for Prio artifact
    Dana Keeler (Mozilla Corporation), Emily Lepert (University of Waterloo), Chelsea Komlo (University of Waterloo), Shannon Veitch (ETH Zurich), and Xi He (University of Waterloo)
  • Blocking JavaScript without Breaking the Web: An Empirical Investigation artifact
    Abdul Haddi Amjad (Virginia Tech), Zubair Shafiq (UC Davis), and Muhammad Ali Gulzar (Virginia Tech)
  • Data Security on the Ground: Investigating Technical and Legal Requirements under the GDPR artifact
    Tina Marjanov (University of Cambridge, Vrije Universiteit Amsterdam), Maria Konstantinou (Vrije Universiteit Amsterdam), Dayana Spagnuelo (Vrije Universiteit Amsterdam, TNO), and Magdalena Jozwiak (Tilburg University)
  • Differential Privacy for Black-Box Statistical Analyses
    Nitin Kohli (UC Berkeley) and Paul Laskowski (UC Berkeley)
  • Secure and Accurate Summation of Many Floating-Point Numbers artifact
    Marina Blanton (University at Buffalo), Michael T. Goodrich (University of California, Irvine), and Chen Yuan (Meta Platforms, Inc.,)
  • Private Collection Matching Protocols artifact
    Kasra EdalatNejad (EPFL), Mathilde Raynal (EPFL), Wouter Lueks (CISPA Helmholtz Center for Information Security), and Carmela Troncoso (EPFL)
  • A Method for Securely Comparing Integers using Binary Trees
    Anselme Tueno (SAP), Jonas Janneck (Ruhr University Bochum), and David Boehm (SAP)
  • Practical Delegatable Anonymous Credentials From Equivalence Class Signatures artifact
    Omid Mir (The Institute of Networks and Security, Johannes Kepler University Linz), Daniel Slamanig (AIT Austrian Institute of Technology, Vienna, Austria), Balthazar Bauer (IRIF, Université de Paris Cité, France), and René Mayrhofer (The Institute of Networks and Security, Johannes Kepler University Linz)
  • Ruffle: Rapid 3-Party Shuffle Protocols
    Pranav Shriram A (National Institute of Technology, Tiruchirapalli), Nishat Koti (Indian Institute of Science), Varsha Bhat Kukkala (Indian Institute of Science), Arpita Patra (Indian Institute of Science), Bhavish Raj Gopal (Indian Institute of Science), and Somya Sangal (Indian Institute of Science)
  • Story Beyond the Eye: Glyph Positions Break PDF Text Redaction artifact
    Maxwell Bland (University of Illinois, Urbana-Champaign), Anushya Iyer (University of Illinois, Urbana-Champaign), and Kirill Levchenko (University of Illinois, Urbana-Champaign)
  • Towards Sentence Level Inference Attack Against Pre-trained Language Models artifact
    Kang Gu (Dartmouth College), Ehsanul Kabir (Dartmouth College), Soroush Vosoughi (Dartmouth College), and Shagufta Mehnaz (The Pennsylvania State University)
  • Time-Deniable Signatures
    Gabrielle Beck (Johns Hopkins University), Arka Rai Choudhuri (NTT Research), Matthew Green (Johns Hopkins University), Abhishek Jain (Johns Hopkins University), and Pratyush Ranjan Tiwari (Johns Hopkins University)
  • Measuring the Compliance of Android App Developers with the California Consumer Privacy Act (CCPA)
    Nikita Samarin (University of California, Berkeley / ICSI), Shayna Kothari (University of California, Berkeley), Zaina Siyed (University of California, Berkeley), Oscar Bjorkman (University of California, Berkeley), Reena Yuan (University of California, Berkeley), Primal Wijesekera (University of California, Berkeley / ICSI), Noura Alomar (University of California, Berkeley), Jordan Fischer (University of California, Berkeley / Drexel Kline School of Law), Chris Hoofnagle (University of California, Berkeley), and Serge Egelman (University of California, Berkeley / ICSI)
  • Detecting DNS Manipulation using TLS Certificates
    Elisa Tsai (University of Michigan - Ann Arbor), Deepak Kumar (Stanford University), Ram Sundara Raman (University of Michigan - Ann Arbor), Gavin Li (University of Michigan - Ann Arbor), Yael Eiger (University of Michigan - Ann Arbor), and Roya Ensafi (University of Michigan - Ann Arbor)

Issue 4

Some of these papers are accepted conditionally on approval of a shepherd.

  • Locality-Sensitive Hashing Does Not Guarantee Privacy! Attacks on Google's FLoC and the MinHash Hierarchy System artifact
    Florian Turati (ETH Zurich), Carlos Cotrini (ETH Zurich), Karel Kubicek (ETH Zurich), and David Basin (ETH Zurich)
  • Researchers’ Experiences in Analyzing Privacy Policies: Challenges and Opportunities
    Abraham Mhaidli (University of Michigan), Selin Fidan (University of Michigan), An Doan (University of Michigan), Gina Herakovic (University of Michigan), Mukund Srinath (Penn State University), Lee Matheson (Future for Privacy Forum), Shomir Wilson (Penn State University), and Florian Schaub (University of Michigan)
  • Structural and functional explanations for informing lay and expert users: The case of functional encryption
    Ala Sarah Alaqra (Karlstad University), Farzaneh Karegar (Karlstad University), and Simone Fischer-Hübner (Karlstad University, Chalmers University of Technology)
  • Compact and Divisible E-Cash with Threshold Issuance artifact
    Alfredo Rial (Nym Technologies) and Ania Piotrowska (Nym Technologies)
  • Speculative Privacy Attitudes and Concerns about AR Glasses Data Collection
    Andrea Gallardo (Carnegie Mellon University), Chris Choy (Carnegie Mellon University), Jaideep Juneja (Carnegie Mellon University), Efe Bozkir (University of Tübingen), Camille Cobb (University of Illinois Urbana-Champaign), Lujo Bauer (Carnegie Mellon University), and Lorrie Cranor (Carnegie Mellon University)
  • End-to-end Privacy Preserving Training and Inference for Air Pollution Forecasting with Data from Rival Fleets
    Gauri Gupta (Massachusetts Institute of Technology), Krithika Ramesh (Manipal Institute of Technology, India), Anwesh Bhattacharya (Microsoft Research, India), Divya Gupta (Microsoft Research, India), Rahul Sharma (Microsoft Research, India), Nishanth Chandran (Microsoft Research, India), and Rijurekha Sen (IIT Delhi)
  • Everybody's Looking for SSOmething: A large-scale evaluation on the privacy of OAuth authentication on the web
    Yana Dimova (imec-DistriNet), Tom Van Goethem (Google), and Wouter Joosen (imec-DistriNet)
  • On the Role and Form of Personal Information Disclosure in Cyberbullying Incidents artifact
    Sadiq Aliyu (University of Lausanne), Kavous Salehzadeh Niksirat (University of Lausanne), Kévin Huguenin (University of Lausanne), and Mauro Cherubini (University of Lausanne)
  • GDPRxiv: Establishing the State of the Art in GDPR Enforcement artifact
    Chen Sun (University of Iowa), Evan Jacobs (University of Iowa), Daniel Lehmann (University of Copenhagen), Andrew Crouse (University of Iowa), and Supreeth Shastri (University of Iowa)
  • Privacy-Preserving Federated Recurrent Neural Networks
    Sinem Sav (EPFL), Abdulrahman Diaa (University of Waterloo), Apostolos Pyrgelis (EPFL), Jean-Philippe Bossuat (Tune Insight SA), and Jean-Pierre Hubaux (EPFL)
  • No Video Left Behind: A Utility-Preserving Obfuscation Approach for YouTube Recommendations
    Jiang Zhang (University of Southern California), Hadi Askari (University of California, Davis), Konstantinos Psounis (University of Southern California), and Zubair Shafiq (University of California, Davis)
  • Differentially Private Simple Genetic Algorithms artifact
    Thomas Humphries (University of Waterloo) and Florian Kerschbaum (University of Waterloo)
  • Data-Explainable Website Fingerprinting with Network Simulation artifact
    Rob Jansen (U.S. Naval Research Laboratory) and Ryan Wails (Georgetown University, U.S. Naval Research Laboratory)
  • Verifiable Distributed Aggregation Functions artifact
    Hannah Davis (University of California, San Diego), Christopher Patton (Cloudflare), MIke Rosulek (Oregon State University), and Phillipp Schoppmann (Google)
  • Robust Fingerprint of Location Trajectories Under Differential Privacy artifact
    Yuzhou Jiang (Case Western Reserve University), Emre Yilmaz (University of Houston-Downtown), and Erman Ayday (Case Western Reserve University)
  • Funshade: Function Secret Sharing for Two-Party Secure Thresholded Distance Evaluation
    Alberto Ibarrondo (Copper.co), Herve Chabanne (Idemia & Telecom Paris), and Melek Onen (EURECOM)
  • Attribute-based Single Sign-On. Secure, Private, and Efficient. artifact
    Tore K. Frederiksen (), Julia Hesse (IBM Research Europe - Zurich), Bertram Poettering (IBM Research Europe - Zurich), and Patrick Towa (Aztec)
  • On the Robustness of Topics API to a Re-Identification Attack artifact
    Nikhil Jha (Politecnico di Torino), Martino Trevisan (Università degli studi di Trieste), Emilio Leonardi (Politecnico di Torino), and Marco Mellia (Politecnico di Torino)
  • Evaluating practical QUIC website fingerprinting defenses for the masses.artifact
    Sandra Siby (EPFL), Ludovic Barman (EPFL), Christopher Wood (Cloudflare Inc.), Marwan Fayed (Cloudflare Inc.), Nick Sullivan (Cloudflare Inc.), and Carmela Troncoso (EPFL)
  • Throwing Your Weight Around: Fixing Tor’s Positional Weighting
    Aaron M. Johnson (U.S. Naval Research Laboratory), Aaron D. Jaggard (U.S. Naval Research Laboratory), and Paul F. Syverson (U.S. Naval Research Laboratory)
  • Save The Implicit Flow? Enabling Privacy-Preserving RP Authentication in OpenID Connect
    Maximilian Kroschewski (Hasso-Plattner-Institute, University of Potsdam) and Anja Lehmann (Hasso-Plattner-Institute, University of Potsdam)
  • Track You: A Deep Dive into Safety Alerts for Apple AirTags
    Narmeen Shafqat (Northeastern University), Nicole Gerzon (Northeastern University), Maggie Van Nortwick (Northeastern University), Victor Sun (Northeastern University), Alan Mislove (Northeastern University), and Aanjhan Ranganathan (Northeastern University)
  • Disparate Vulnerability in Link Inference Attacks against Graph Neural Networks artifact
    Da Zhong (Stevens Institute of Technology), Ruotong Yu (University of Utah), Kun Wu (Stevens Institute of Technology), Xiuling Wang (Stevens Institute of Technology), Jun Xu (University of Utah), and Wendy Hui Wang (Stevens Institute of Technology)
  • The Self-Anti-Censorship Nature of Encryption: On the Prevalence of Anamorphic Cryptography
    Mirek Kutylowski (Wroclaw University of Science and Technology), Giuseppe Persiano (UNISA and Google), Duong Hieu Phan (Telecom Paris, Institut Polytechnique de Paris), Moti Yung (Google and Columbia), and Marcin Zawada (Wroclaw University of Science and Technology)
  • MAPLE: A Metadata-Hiding Policy-Controllable Encrypted Search Platform with Minimal Trust
    Tung Le (Virginia Tech) and Thang Hoang (Virginia Tech)
  • Attacks on Encrypted Response-Hiding Range Search Schemes in Multiple Dimensions artifact
    Evangelia Anna Markatou (Brown University), Francesca Falzon (Brown University, University of Chicago), Zachary Espiritu (Brown University), and Roberto Tamassia (Brown University)
  • Trifecta: Faster High-Throughput Three-Party Computation over WAN Using Multi-Fan-In Logic Gates
    Sina Faraji (University of Waterloo) and Florian Kerschbaum (University of Waterloo)
  • Exploring the Privacy Risks of Adversarial VR Game Design artifact
    Vivek Nair (UC Berkeley), Gonzalo Munilla Garrido (TU Munich), and Dawn Song (UC Berkeley)
  • DP-SIPS: A simpler, more scalable mechanism for differentially private partition selection
    Marika Swanberg (Boston University), Damien Desfontaines (Tumult Labs), and Samuel Haney (Tumult Labs)
  • Understanding the Perception and Awareness of Education Technologies' Privacy and Security Issues
    Rakibul Hasan (Arizona State University)
  • Your DRM Can Watch You Too: Exploring the Privacy Implications of Browsers (mis)Implementations of Widevine EME artifact
    Gwendal Patat (Univ Rennes, CNRS, IRISA), Mohamed Sabt (Univ Rennes, CNRS, IRISA), and Pierre-Alain Fouque (Univ Rennes, CNRS, IRISA)
  • Privacy-Preserving Outsourced Certificate Validation
    Tarek Galal (Hasso-Plattner Institute, University of Potsdam) and Anja Lehmann (Hasso-Plattner Institute, University of Potsdam)
  • Examining StyleGAN as a Utility-Preserving Face De-identification Method
    Seyyed Mohammad Sadegh Moosavi Khorzooghi (The University of Texas at Arlington) and Shirin Nilizadeh (The University of Texas at Arlington)